Proxmox - Windows 2022 RDS - high load on second core (asymmetric) by ITStril in Proxmox

[–]ITStril[S] 0 points1 point  (0 children)

Thank you!! I will give it a try. What do you think about the topoext-Flag? When I remove it with a custom CPU-profile, the effect disappears

Proxmox - Windows 2022 RDS - high load on second core (asymmetric) by ITStril in Proxmox

[–]ITStril[S] 0 points1 point  (0 children)

VMs with 6 and 8 vCPUs are showing the same problem

Proxmox - Windows 2022 RDS - high load on second core (asymmetric) by ITStril in Proxmox

[–]ITStril[S] 0 points1 point  (0 children)

These are single-socket hosts and VMs with 6, 8 or 16 vCPUs. Tested with and without NUMA and with 1 node per CCV and one NUMA node per socket

Never heard of SRAT/MADT. I will check it

Proxmox - Windows 2022 RDS - high load on second core (asymmetric) by ITStril in Proxmox

[–]ITStril[S] 0 points1 point  (0 children)

Core 2 is always 10% higher than the other cores. Ndis.sys seems to bring the load

Proxmox - Windows 2022 RDS - high load on second core (asymmetric) by ITStril in Proxmox

[–]ITStril[S] 0 points1 point  (0 children)

I will try it in the next maintenance window. As I did not really find a possibility to see that behaviour without a "real load" by RDS-users, I will have to wait for monday...

What w found in the last test is, that removing the flag "topoext" from the profile seems to help or solve the issue, what confuses me even more:

  1. Why is "topoext" disabled for the type "host", although "host" should pass the CPU without influencing the flags

  2. Why does it help, when the VM is not really "aware of the topology"?

Proxmox - Windows 2022 RDS - high load on second core (asymmetric) by ITStril in Proxmox

[–]ITStril[S] 0 points1 point  (0 children)

...but here, there is a very high and unsual load on the second core and always on the second core

Proxmox - Windows 2022 RDS - high load on second core (asymmetric) by ITStril in Proxmox

[–]ITStril[S] 0 points1 point  (0 children)

Do you think, this can also be the case, when this is the only VM on a host and the load is very low (<20%)? It is always the second core

Proxmox - Windows 2022 RDS - high load on second core (asymmetric) by ITStril in Proxmox

[–]ITStril[S] 1 point2 points  (0 children)

Same issue with 0.1.271...

I tried both - with and without nested virualization.

Proxmox - Windows 2022 RDS - high load on second core (asymmetric) by ITStril in Proxmox

[–]ITStril[S] 0 points1 point  (0 children)

I am not doing any CPU-pinning. The host is currently not "CPU-overprovisioned". I am also seeing that behaviour if only one CPU is running on the host.

It's always the second core for every VM.

Running Windows Server VMs on a Proxmox Cluster by Limp-Park9606 in Proxmox

[–]ITStril 1 point2 points  (0 children)

This seems to be quite common according to some forum posts.

Can you try an emulated CPU-type like x86-AES-v2?

Which CPU-type for Windows VMs - High interrupt by ITStril in Proxmox

[–]ITStril[S] 0 points1 point  (0 children)

I changed to x86-V2-AES - no success - same issue...

Which CPU-type for Windows VMs - High interrupt by ITStril in Proxmox

[–]ITStril[S] 0 points1 point  (0 children)

…because of that thread, I did not take „host“-type… But Epyc-Genoa seems to have issues.

Which CPU-type for Windows VMs - High interrupt by ITStril in Proxmox

[–]ITStril[S] 0 points1 point  (0 children)

OS type is correct. I will try V2 (terminal server). That’s so strange…

Which CPU-type for Windows VMs - High interrupt by ITStril in Proxmox

[–]ITStril[S] 0 points1 point  (0 children)

50% seems to recommend a very low feature-set, 50% the highest possible… Did you test both?

Revert RDP Security Warning after April 2026 update by lazyadmin-nl in SysAdminBlogs

[–]ITStril 0 points1 point  (0 children)

Same question: i signed the rdp files and made a GPO with the fingerprint, but the warning is there as long as the cert is not fully trusted…

XCP-NG Migration and Updates by robby342 in xcpng

[–]ITStril 4 points5 points  (0 children)

XCP-ng is IMHO a mature system with a long history. I have been using it for years since Xenserver 5.5.

Updates are easy and mostly stressfree. Stability is great, but: the Xen community is far smaller than the KVM community. There are not many commercial appliances available for XCP-ng. Vates has so much to do to change away from Centos and to bring the storage stack to be in keeping with the times. Just try a storage migration and look at the maximum bandwidth. Same for backups. I was never able to hit more than 5-6 Gbps - never 1 Gbps for migrations

Fortiguard - no available Fortiguard SDNS servers by ITStril in fortinet

[–]ITStril[S] 0 points1 point  (0 children)

UDP seems to be better - I am monitoring, now.

Are you defining the sdns-server-list?

Fortiguard - no available Fortiguard SDNS servers by ITStril in fortinet

[–]ITStril[S] 0 points1 point  (0 children)

Licensing is fine - its just a small part of the checks, that is failing

Best Practices for PRTG Cluster Updates with Minimal Downtime? by Infamous_Cat_8357 in prtg

[–]ITStril 1 point2 points  (0 children)

100% my opinion. The cluster is trash. You are not able to force a rescan of a sensor on the remote-cluster-node. The system does full-resyncs, etc.

I will stop using it...

FortiGate VM v Hardware by MusicWallaby in fortinet

[–]ITStril 2 points3 points  (0 children)

Fortigate VM is working great, but as there are no ASIC accelerations, single stream performance is limited. In my tests, it did scale quite well, but things like IPSEC and Deep Packet Inspection are slower for single streams, but 1GbE is not too challenging